Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward the computers away from the network source. Which devices should Fern employ to strengthen the signal? A. hubs B. switches C. repeaters D. gateways

Answers

Answer 1

Answer:

Repeaters

Explanation:

As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source.  Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.


Related Questions

Which draws a line while moving the pen 30 steps to the right?
from turtle import*
o drawright(30)
o move(30)
oright(30)
o forward(30)

Answers

Answer:

forward(30)

Explanation:

the turtle.forward command will move the turtle to the right

How have cloud and 5g helped make extended reality (xr) technology more accessible to a wide audience?.

Answers

Cloud and 5G helped make extended reality (XR) technology more accessible to a wide audience by tracking as well as managing activity of users in extended reality using blockchain databases.

What is Cloud and 5G?

5G technology is bringing major improvements to the cloud computing. Most technology innovations can be more efficient when they are cloud-dependent. 5G makes communications more smoother and faster.

This activity is managed by the database management.

Thus, Cloud and 5G helped make extended reality (XR) technology more accessible to a wide audience by tracking as well as managing activity of users in extended reality using blockchain databases.

Learn more about Cloud and 5G.

https://brainly.com/question/11973901

#SPJ1

A family just changed to a different mobile phone and data service provider. They now need take some time to transfer their content to new phones and learn the features of the new service. This is an example of a:

Answers

The above scenario is an example of  switching cost customers incur changing to a new supplier.

What id Switching costs?

This is known to be the the costs that a consumer gets or has due to the effect of changing brands, or products.

Note that the above is an example of  switching cost customers incur changing to a new supplier as they are said to be psychological, effort-based, and needs time.

Learn more about mobile phone from

https://brainly.com/question/917245

#SPJ1

Research the history of Internet in computers

Answers

Answer:

This allowed different kinds of computers on different networks to "talk" to each other. ARPANET and the Defense Data Network officially changed to the TCP/IP standard on January 1, 1983, hence the birth of the Internet. All networks could now be connected by a universal language.

Advantages of using Unicode to represent data

Answers

Global source and binary.
Support for mixed-script computing environments.
Improved cross-platform data interoperability through a common codeset.
Space-efficient encoding scheme for data storage.
Reduced time-to-market for localized products.
Expanded market access.

You are researching a topic online. You follow a link on a science association's website, but the webpage will not load. What is the most reasonable hypothesis for this problem

Answers

The most reasonable hypothesis for this problem is that the domain name or uniform resource locator (URL) is invalid.

What is a website?

A website is a collective name for a series of webpages that are interconnected with the same domain name, so as to provide certain information to end users.

In this scenario, since the Internet is active, the most reasonable hypothesis why the webpage will not load is that the domain name or uniform resource locator (URL) is invalid.

Read more on websites here: https://brainly.com/question/26324021

#SPJ1

What are the real-life applications of coding? at least 5 to 6 lines anyone

Answers

The real-life applications of coding is that they are used in:

Traffic LightsCoffee Machines, etc.

What are useful applications of codes?

Coding is known to be a tool that helps to make  a composition of instructions that a computers needs to follow.

Note that in real life, Coding helps programmers to create programs, such as websites and apps that are used in Traffic Lights, etc.

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1

A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company network. The firewalls are products of two separate companies. This is an example of what type of security control practice?

Answers

Answer:

Vendor diversity

Explanation:

Different cybersecurity companies maintain different codebases, which means an exploit that might poke holes in the security of one likely won't breach the other. In this situation, the network would still have an active and effective firewall from one vendor even as the exploit from the other vendor's firewall is being patched.

Development
Select the correct answer from each drop-down menu.
What is DHTML?
DHTML is ______ . It’s allows you to add functionality such as ______

The answer options for part 1 are A: an updated version of html B: a version of html meant for mobile devices or C: a set of technologies that allows developers to create interactive websites. Part 2 answer options are A:loading pages in the background B:automatic sign in or C: drop down menus and roll over text

Answers

Answer:

Part 1: C

Part 2: C

Explanations:

Answer

DHTML is ______. It allows you to add functionality such as ______

a set of technologies that allows developers to create interactive websites drop-down menus and rollover text

I hope this help

BTW PLATO

a computer is made up of four different types of devices which are

Answers

A computer is made up of four different types of devices which are input, storage, processing and output devices.

What are computer devices?

Computer devices are those components of computer known as the computer hardware that ensures the proper functioning of the system.

The four different types of devices found in the computer are :

Input devices: These are used to put in data into the system.

Storage device:. These are used for storage of processed data.

Processing device: This is the brain box of the computer.

Output devices: They are used to display data.

Learn more about hardware here:

https://brainly.com/question/24370161

#SPJ1

the japanese call the practice of stopping production when a defect occurs

Answers

Answer:

Jidoka

Explanation:

hope this helps:)

Android os is developed by​

Answers

Answer:

It is developed by G oogle

Explanation:

Android os is developed by G oogle. It launched in 2008.

Alma will make the honor roll if she has at least a 3.80 GPA and misses less than 5 days of school in a year. In which of the following cases will Alma make honor roll?



1. Alma has a 3.84 GPA and misses 5 days of school


2. Alma has a 3.78 GPA and misses 2 days of school


3. Alma has a 3.68 GPA and misses 6 days of school


4. Alma has a 3.81 GPA and misses 3 days of school

Answers

Answer: 4. Alma has a 3.81 GPA and misses 3 days of school

Explanation: The others don't meet the requirments.

The only case where Alma will make honor roll is the fourth case where she has a 3.81 GPA and misses 3 days of school.

What is GPA?

GPA stands for Grade Point Average, and it is a measure of a student's academic performance in a given period.

It is calculated by assigning a numerical value to each grade received in a course and then averaging those values.

Based on the given criteria, Alma will make honor roll if she has at least a 3.80 GPA and misses less than 5 days of school in a year.

Alma has a 3.84 GPA and misses 5 days of school: Alma has the required GPA, but she misses 5 days of school which is greater than the allowed 5 days. Therefore, she will not make honor roll.

Alma has a 3.78 GPA and misses 2 days of school: Alma misses less than 5 days of school, but her GPA is less than the required 3.80. Therefore, she will not make honor roll.

Alma has a 3.68 GPA and misses 6 days of school: Alma misses more than 5 days of school, and her GPA is less than the required 3.80. Therefore, she will not make honor roll.

Alma has a 3.81 GPA and misses 3 days of school: Alma has the required GPA and misses less than 5 days of school. Therefore, she will make honor roll.

Thus, Alma will only make honour roll if she has a 3.81 GPA and misses three days of school in the fourth case.

For more details regarding GPA, visit:

https://brainly.com/question/15170636

#SPJ2

The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound and outbound traffic and preventing unauthorized users and malicious code from entering a network. .

Answers

Maybe the answer is “server”

Date Underline the correct answer from the options. 1. How many basic input devices does a desktop computer have? .. a)2 b)3 c) 1 d)4 2. The computer equipmentwhich feeds the computer with data is called. a) Storage device b) Processing device c) Diskette d) Input device 3.When an output is displayed in a printed form it is termed as a) Softcopy output b) File c) Document d) Hardcopy output
4. Which computer device will convert human voice into digital voice? a) Projector b) Loudspeaker c) Microphone d) Joy. 5) All the following are hardcopy output devices except a) Photocopier b) Printer c) Projector d) Plott​

Answers

Answer:

1. 3

2. D (Input Device)

3. B (File)

4. C (Microphone

True or false. The send e-mail feature, listed under tools, will allow you to send an e-mail to your instructor and to fellow students directly from your online course in blackboard.

Answers

Answer:

TRUE

Explanation: please mark me brainliest

You have the following code:
----------------------------------------------------------------------------------------------
fruit_list = ["strawberries", "bananas", "apples", "grapes"]
total_cost = 0
for fruit in fruit_list:
if fruit in ["apples","bananas"]:
total_cost += 3
elif fruit == "cantaloupe":
total_cost += 5
elif fruit in ["raspberries","strawberries","grapes"]:
total_cost += 4
-------------------------------------------------------------------------------------------------

What will be the value of total_cost?

A.13
B.14
C.15
D.7

Answers

Answer:

7

Explanation:

We already have the functions that tells us how much to add. If you add all this, you will get 12. HOWEVER because cantaloupe is in the list, the computer does not count that. So if we add that again without 5(how much the cantaloupe costs), we get 7.

How do smartphone screens work?

Answers

Smartphones screens work Using electricity

Answer:

Touchscreens work using electricity. The screen is made of glass, an insulating material – it cannot carry an electric current.

Explanation:

At Universal Containers, the sales managers would like Opportunities that have NOT been updated in the past 30 days to automatically be flagged. How should a System Administrator implement this requirement

Answers

The System Administrator implement and Create a formula field to calculate the time since last update and display an image of a red flag if it meets the defined criteria.

What is a  Formula field?

This is known to be a read-only fields that often calculate a value through the use of other fields or a given  formula.

Note that The System Administrator implement his requirement and Create a formula field to calculate the time since last update and display an image of a red flag if it meets the defined criteria.

Learn more about System Administrator  from

https://brainly.com/question/27129590

#SPJ1

Because of the Patriot Act of 2001, law enforcement officials:

OA. can access your email
activity more easily.

OB. must periodically check your online activity.

OC. are not authorized to monitor your emails.

OD. need permission to view your text messages.

Answers

Based on  the Patriot Act of 2001, law enforcement officials must periodically check your online activity.

What is the role of Patriot Act ?

The USA Patriot Act is known to be an Act that hinders and punishes terrorist attacks that is done in any part of the United States and abroad via enhanced law enforcement and others.

Therefore, Based on  the Patriot Act of 2001, law enforcement officials must periodically check your online activity to see if there is threat to national security.

Learn more about Patriot Act from

https://brainly.com/question/25741451

#SPJ1

Answer:

A, can access your email activity more easily

Explanation:

Trust me its correct

Write a program that takes a 10-digit phone number and adds a hyphen in the correct location. Using an input field for the user to enter the information. Also, use a string for instructions on how to enter the phone in the input field.

Answers

The python program will request for a ten digit number from the user and formulate a real phone number from it.

How to write a python program to form a real phone number?

The program is written in python.

Therefore,

x = input("please write a ten digit number: ")

if len(x) == 10:

    a = f"({x[0:3]})"

    b = x[3:6]

    c = x[7:]

    print(a + " " + b + "-" + c)

Code explanation:The variable x is used to store the user's input.If the length of x is equals to 10, then we get the first three terms in bracket, the second three terms and the last 4 terms.Finally, we use delimiters to join the variables as required and print it out.  

learn more on python here: brainly.com/question/13462052

#SPJ1

This is about a software called GIMP

Answers

Answer:

The answer is Stroke

Explanation:

Stroke outlines objects on a layer

Answer:

The correct answer is Stroke.

Explanation:

Go to the Edit menu now and from here, click on the Stroke Selection option. A dialog box will open up where you need to select the Stroke Line option and then set up various options like solid line, line style, dash pattern, line width, etc. After setting up these options, press the Stroke option, and wooo u did it!

Hope this helps:) Goodluck!

can I have some help?

Answers

I believe its A as the image provided says plain message

CODEHS: WHY is it important to know the difference between div and span?

Answers

Span and div are both generic HTML elements that group together related parts of a web page. However, they serve different functions. A div element is used for block-level organization and styling of page elements, whereas a span element is used for inline organization and styling.

what ctrl to show the font dialog box​

Answers

Answer:

Ctrl + D key  [Same time]

Explanation:

Using this imput will allow you to see the font dialog box :D

Have a great day <3

9.2 lesson practice ​

Answers

Answer:

6 columns/items

Explanation:

grid starts off as an empty list ( [ ] ), so right now it has 0 items/columns.

After that, 3 new items ("frog", "cat", "hedgehog") have been appended to grid, it now has 3 items

Finally another 3 items are appended to grid ("fish", "emu", "rooster"), finally grid ends up with 6 items in total.

Which email protocol allows an email client to download email messages to the local computer?.

Answers

Answer:

The protocol is called Post Office Protocol version 3(POP3)

Explanation:

Hope this helps!

Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he sees that the computer is running windows and has open applications. he decides to preserve as much data as possible by capturing data in memory. what should carl perform

Answers

Answer:

Volatile memory analysis

Explanation:

volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory

6.25 lab: even/odd values in a vector write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. the input begins with an integer indicating the number of integers that follow. ex: if the input is:

Answers

def is_list_even(my_list):

   for i in my_list:

       if(i%2 != 0):

           return False

   

   return True

   

   

def is_list_odd(my_list):

   for i in my_list:

       if(i%2 == 0):

           return False

   

   return True

   

def main():

   n = int(input())

   lst = []

   

   for i in range(n):

       lst.append(int(input()))

   

   if(is_list_even(lst)):

       print('all even')

   

   elif(is_list_odd(lst)):

       print('all odd')

   

   else:

       print('not even or odd')

       

       

if __name__ == '__main__':

   main()

100 POINTS ANSWER CORRECTLY AND ANSWER QUICKLY I DONT HAVE MUCH TIME
You are creating a function that will test whether a number is greater than 10 using these lines of code:
if a < 10:
print(a "is greater than 10")
Can you identify one syntax error and one logic error in these lines? Why do you think a programmer might have made the logic error?

Answers

Yes there's syntax error .

After if there's colon so the next line or code block should start after some spaces(min 4)

The correct code is

[tex]\tt def(a)[/tex]

[tex]\tt if\:a<10:[/tex]

[tex]\quad\tt print(a,"is\:greater\:than\:10")[/tex]

Other Questions
2. If A and B are square matrices of the same order, then (A + B) (A - B) is equal to (a) A B (b) A BA AB - B (c) A - B + BA AB (d) A - BA +B+ AB WILL MARK BRAINLIEST mark and sally went to the mall. Marl borrowed $2 from sally for lunch. Then, he gave sally $17 for a new t - shirt. How much dose sally have to pay in debt? Question 9 of 15 6 an object is moving due north at 32m/s does this tell you the speed or the velocity of the object, or both? A child grew 3 1/4 inches one year and 4 3/4 inches the next year. How many inches did the child grow over the two years? 50 x 1000pls reply guys Find the Area and circumference of each circle below. chlorophyll is necessary for photosynthesis Select the correct answer.Why were students protesting at Kent State University on May 4, 1970?A. to protest police brutality against African AmericansB. to oppose Nixon's order to send troops to CambodiaC. to oppose the use of bombs by the militant Weathermen groupD. to protest the killing of college students at Jackson State University What is Queen Latifah's birth name?O A. Cheryl JamesO B. Dana OwensO c. Sandy DentonO D. Roxanne Shant A rectangle has a perimeter of 60m. Find thelength of the rectangle if its breadth is12m What is the largest possible electronegativity difference for a bond to be covalent?A.0.5B.1.7C.0.0D.1.0 [Title][Name][Course Name and Number][Instructor Name][Date]Memo:To:From:Date:Subject:1. Introduction- Attention getter- Discuss what the memo topic is2. Definitions of Social Risk Factors and the 3 Delinquent behaviorso Social Risk Factor 1o Social Risk Factor 2o Social Risk Factor 3o Social Risk Factor 4o Social Risk Factor 5o Psychological Explanation: o Sociological Explanation:o Biochemical Explanation:3. Conclusion- Recap the memo Can you please give some example's of endangered animal's ? : 2. (b) Why is it important to maintain genetic diversity in populations? What happened to Mary Todd Lincoln after the assassination? Read this sentence:Night came on quickly like a giant hand had pulled down a black velvet curtain.What does the phrase black velvet curtain suggest? The night had a bit of activity. The night was suddenly quite dark. The narrator was frightened. The night was without sound. Whats the answer?????? What is global interdependence. What did you include in your translation? Check all that apply. Should I go